Filter by
The language used throughout the course, in both instruction and assessments.
Results for "application layer security"
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Linux, Encryption, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Software Development Life Cycle, Linux Commands, Unit Testing, Bash (Scripting Language), Shell Script, Git (Version Control System), GitHub, Development Environment, Version Control, File Management, Jupyter, Software Engineering, Software Architecture, Application Deployment, Automation, Flask (Web Framework), Web Scraping, Python Programming, Open Source Technology, Application Development
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, Git (Version Control System), DevOps, Jupyter, Grafana
Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Computer Security, Infrastructure Security, Information Systems Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Other Programming Languages, Algorithms
In summary, here are 10 of our most popular application layer security courses
- Systems and Application Security: ISC2
- Google IT Support: Google
- Security and Authentication: Microsoft
- Cybersecurity Architecture: IBM
- IT Fundamentals for Cybersecurity: IBM
- Proactive Computer Security: University of Colorado System
- IBM Cybersecurity Analyst: IBM
- Applied Software Engineering Fundamentals: IBM
- IBM Back-End Development: IBM
- IBM DevOps and Software Engineering: IBM